Exam Prep Questions

Question 1Which is not supported for Web clients?
  • A. Encrypted fields.

  • B. Names fields.

  • C. Readers fields.

  • D. Authors fields.

A1: The correct answer is A. Web users cannot read encrypted fields. B is incorrect because Names field are supported on the Web. C is incorrect because Readers fields are supported on the Web. D is incorrect because Authors fields are supported on the Web.
Question 2The Administration server specified for a database is responsible for what?
  • A. Compacting the database.

  • B. Monitoring database size and enforcing quotas.

  • C. Selecting encryption keys.

  • D. Keeping names in the ACL and optionally in the Names fields synchronized with the Domino Directory.

A2: The correct answer is D, the Administration server's AdminP process is responsible for keeping names in the ACL and optionally in the Names fields synchronized with the Domino Directory. A is incorrect because the Compact task compacts databases. B is incorrect because the Administration process does not enforce quotas. C is incorrect because the Administration process has nothing to do with encryption.
Question 3Encrypting fields on a document restricts access to what?
  • A. The document.

  • B. The contents of the encrypted fields.

  • C. The database.

  • D. You cannot encrypt fields, only documents.

A3: The correct answer is B. Only the fields that have been encrypted require an encryption key to access them. A and C are incorrect because field-level encryption blocks access to only certain fields. D is incorrect because you can encrypt fields.
Question 4The Execution Control List (ECL) is responsible for what?
  • A. Scheduling agents.

  • B. Controlling who can change the ACL of a database.

  • C. Controlling who can run code and what code can do on a workstation.

  • D. Controlling who can run code and what code can do on a server.

A4: The correct answer is C. ECLs are used to control who can run code on a workstation and what that code can do. A is incorrect because the ECL has nothing to do with scheduling agents. B is incorrect because the ECL has nothing to do with changing the database ACL. D is incorrect because ECLs only affect execution on the Notes client.
Question 5Enabling the Enforce a Consistent Access Control List property for a database does what?
  • A. Ensures that server-based databases have a consistent ACL on all replica copies.

  • B. Ensures that only an administrator can change a database's ACL.

  • C. Enforces ACLs on local databases stored on a workstation.

  • D. Ensures that local databases have a consistent ACL on all replica copies.

  • E. Both C and D.

A5: The correct answer is E. When the Enforce a Consistent Access Control List property is enabled for a database, it ensures that all local replicas maintain a consistent ACL and that the ACL of the database is enforced locally. B is incorrect because Enforce Consistent Access Control List doesn't affect who can change the ACL. Only those with Manager access in the ACL can change the ACL. C is incorrect because Enforce Consistent Access Control List also ensures that local databases have a consistent ACL on all replica copies. D is incorrect because Enforce Consistent Access Control Lists also enforces ACLs on local databases stored on a workstation.
Question 6Which of the following are valid design element security options?
  • A. Server access list.

  • B. Form Create list.

  • C. View Access list.

  • D. Both B and C.

A6: The correct answer is D. Both Form Create List and View Access List are security options that can restrict access to design elements. A is incorrect because a Server access list restricts access to the server. B and C are incorrect because both Form Create lists and View Access lists are valid design element security options.
Question 7Where is field-level encryption controlled?
  • A. Individual fields cannot be encrypted.

  • B. The Info tab of the Field properties box.

  • C. The Form Info tab of the Form properties box.

  • D. The Advanced tab of the Field properties box.

A7: The correct answer is D. Field level encryption options are set on the Advanced tab of the Field properties box. A is incorrect because individual fields can be encrypted. B is incorrect because field-level encryption settings are controlled on the Advanced tab of the Field properties box. C is incorrect because field-level encryption settings are controlled on the Advanced tab of the Field properties box, not the Form properties box.
Question 8Extended ACLs (xACLS) can be used in which type of database?
  • A. Databases using the log.ntf template, such as the Notes Log.

  • B. Any database.

  • C. Databases using the PUBNAMES.NTF template, such as the Domino Directory or an Extended Directory Catalog.

  • D. Databases using the PERNAMES.NTF template, such as a Personal Address Book.

A8: The correct answer is C. Extended ACLs help delegate administration tasks in databases using the PUBNAMES.NTF template. A, B, and D are incorrect because Extended ACLs are only used with databases based on the PUBNAMES.NTF template.
Question 9Roles simplify database administration and can be used where to grant or deny access in a database?
  • A. Form compose list.

  • B. View read list.

  • C. Readers fields.

  • D. All of the above.

A9: The correct answer is D. Roles can be used in any of the access control elements listed in this question. A is incorrect because Roles can also be used in View read lists and Readers fields. B is incorrect because Roles can also be used in Form compose lists and Readers fields. C is incorrect because Roles can also be used in Form compose lists and View read lists.
Question 10Encrypted email sent to other Domino users uses which type of key?
  • A. Secret key.

  • B. Public key.

  • C. User key.

  • D. One-way hash.

A10: The correct answer is B. Notes mail uses public key encryption. A is incorrect because Notes mail uses public key encryption. C is incorrect because User key encryption is not a valid concept in Notes. D is invalid because one-way hashing is only used in Notes to protect user's passwords.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.17.110.58